Abstract
Public key cryptography helps make information and communication technology (ICT) systems more secure. Public key infrastructures (PKIs) enable the use of public key cryptography in open computer networks, in particular on the Internet. In this chapter, we use characteristic examples of Internet applications to illustrate potential threats against ICT and describe important security goals that can be achieved using public key cryptography and PKI. We discuss the basics of public key cryptography and explain how this technology supports the security goals explained in this chapter. Finally, we present the challenges that lead to the need for PKI. For more details on public key cryptography see [4].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
G. Appenzeller, L. Martin, M. Schertler, Identity-based encryption architecture and supporting data structures, in IETF Request for Comments, 5408, Jan 2009
D.J. Bernstein, J. Buchmann, E. Dahmen (ed.), Post Quantum Cryptography (Springer, Berlin, 2008)
X. Boyen, L. Martin, Identity-based cryptography standard (IBCS) #1: supersingular curve implementations of the BF and BB1 cryptosystems, in IETF Request for Comments, 5091, Dec 2007
J.A. Buchmann, Introduction to Cryptography, 2nd edn. (Springer, New York, 2004)
Common Criteria, Common criteria for information technology security evaluation—part 3: security assurance components—version 3.1 (2007), http://www.commoncriteriaportal.org/thecc.html
W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory IT-22(6), 644–654 (1976)
M. Gardner, Mathematical games: a new kind of cipher that would take millions of years to break. Sci. Am. 237(2), 120–124 (1977)
Internet Usage, http://www.internetworldstats.com/stats.htm
D. Johnson, A. Menezes, S. Vanstone, The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)
L. Martin, M. Schertler, Using the Boneh-Franklin and Boneh-Boyen identity-based encryption algorithms with the cryptographic message syntax (CMS), in IETF Request for Comments, 5409, Jan 2009
National Bureau of Standards, Data Encryption Standard, FIPS PUB 46, Jan 1977
National Institute of Standards and Technology (NIST), FIPS PUB 46-3 – Data Encryption Standard (DES) (1999), http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf
National Institute of Standards and Technology (NIST), FIPS PUB 186-2 – Digital Signature Standard (DSS) (2000), http://csrc.nist.gov/publications/fips/archive/fips186-2/fips186-2.pdf
National Institute of Standards and Technology (NIST), FIPS PUB 197 – specification for the Advanced Encryption Standard (AES) (2001), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf
Privacy Breach, http://www.nytimes.com/2007/11/22/world/europe/22data.html
R.L. Rivest, M.J.B. Robshaw, R.Sidney, Y.L. Yin, The RC6 block cipher (1998), ftp://ftp.rsasecurity.com/pub/rsalabs/rc6/rc6v11.pdf
RSA Laboratories, PKCS #1 v2.1: RSA cryptography standard (2002), http://www.rsa.com/rsalabs/node.asp?id=2125
Serpent – A Candidate Block Cipher for the Advanced Encryption Standard, http://www.cl.cam.ac.uk/~rja14/serpent.html
P.W. Shor, Algorithms for quantum computation: discrete logarithms and factoring, in Proceedings of the 35th IEEE Annual Symposium on Foundations of Computer Science, Santa Fe, Nov 1994, pp. 124–134
The Clinton Administration’s Policy on Critical Infrastructure Protection: Presidential Decision Directive 63 (1998), http://csrc.nist.gov/drivers/documents/paper598.pdf
The Legion of the Bouncy Castle, http://www.bouncycastle.org/
Twofish, http://www.schneier.com/twofish.html
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Buchmann, J.A., Karatsiolis, E., Wiesmaier, A. (2013). The Purpose of PKI. In: Introduction to Public Key Infrastructures. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-40657-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-40657-7_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-40656-0
Online ISBN: 978-3-642-40657-7
eBook Packages: Computer ScienceComputer Science (R0)